Flexible Replication

Flexible Replication

What It Is

Getting data when and where you need it can be challenging—and even risky or impossible. Flexible Replication solves this problem by allowing you to easily distribute your data across multiple geographically dispersed clusters and mobile users without worrying about security vulnerabilities or disconnected, intermittent, and latent networks.

Flexible Replication differs from Database Replication because it allows data to be filtered and manipulated before replication. These capabilities allow end-users to get the information that they need faster, as less data is replicated, and for DBAs to control access to information, as they control what documents and what parts of the documents are replicated within a domain. Flexible Replication is best for collaboration use cases while Database Replication is aimed at disaster recovery.

MarkLogic 8 gives you the ability to filter data based on queries. This makes replication fast, flexible and dynamic.

  • First, it allows data synchronization consuming the least amount of bandwidth as users narrow the scope of the replication to what they need
  • Second, it supports the entire scope of MarkLogic’s query capabilities allowing any type of search to filter content
  • Third, simple updates to the query will dynamically update which data is replicated
All of this occurs while maintaining consistent security across all databases, ensuring reliable data access control


Global Replication

Why It Matters

Today, organizations and employees are geographically dispersed and increasingly need fast access to data or the ability to take the data they need with them while on the move. Work that once was done in a single location now requires collaboration between multiple people across many time zones. Flexible Replication addresses these needs with secure, speedy, and relevant data sharing and collaboration across multiple sites and mobile users.

Movement of data between detached users and main sites is facilitated via pull techniques, to allow the user maximum control over the utilization of their bandwidth. This allows users to take the data they need for a task, mission, or meeting. When documents are updated, custom code can be put in place to control versioning and conflict resolution. This is a proven solution deployed in critical operations across numerous sites and laptops.